“Easy to use, simple to implement. End users can find their way around it without needing much if any training.”
Encryption that Ensures Privacy
Make sure that only your intended parties are able to access your files with Cerberus FTP-Server’s enterprise-grade file transfer encryption.
Flexible Encryption Key Management
Cerberus FTP Server offers numerous key management tools, including SSH2 public key authentication; support for RSA, DSA, and Elliptical Curve public and private keys; and support for Ephemeral Diffie-Hellman key exchange.
Easily Manage Compliance and Security
Cerberus FTP Server’s powerful tools support the most stringent internal compliance and security policies.
Cerberus automatically provides full audit trails showing who transferred what files to where; how and when they did it; and their transfer and connection statistic, with detailed reports available in the Report Manager.
Eliminate Insecure Email File Transfer
Use Cerberus’s ad-hoc file transfer option to share unique, time-limited public links via HTTPS.
Have questions about using Cerberus for secure legal file transfer?
Contact our pre-sales support:
Requirements for Secure File Transfer at Law Firms
The legal industry largely self-regulates its cybersecurity policies in compliance with the jurisdiction or industry in which a firm may operate. This section provides an overview of the major industry requirements that apply to secure file transfer for law firms.
E.U. - Council of Bars and Law Societies of Europe (CCBE)
The E.U.’s General Data Protection Regulation provides the core framework for European file transfer security. However, the Council of Bars and Law Societies of Europe (CCBE) also provides guidance for law firms operating within the E.U.’s jurisdiction.
U.S. - American Bar Association
The ABA provides guidance for lawyers in Formal Opinion 477R*, which states “A lawyer should understand and use electronic security measures to safeguard client communications and information….if client information is of sufficient sensitivity, a lawyer should encrypt the transmission.”
U.S. - Legal Cloud Computing Association
The LCCA encourages its members and legal service providers to adopt the following data security practices:
- Standard 5: Encrypt all transmitted data
- Standard 8: Ensure that data retention policies are in effect to properly delete access to client data
- Standard 9: Use strong end user authentication
- Standard 11: Be able to track user activity within the firm’s system
- Standard 21: Have a disaster recovery plan in place
Learn more here: The Legal Cloud Computing Association’s Security Standards